Here is the weekly roundup :
|
Hacking Marketplace Nulled.IO Hacked
|
The email addresses, private messages, IPs and password data of some 500,000 members of a hacker forum that essentially served as a marketplace of compromised passwords, stolen bitcoins, and other data has been leaked.
|
|
Sony Breach from 2014 Linked to Bangladesh Bank Cyber Heist
|
Investigators looking into the Bangladesh bank cyber heist have revealed that the evidence of a specific malware discovered in the attack has the “same unique characteristics” as malware found in the infamous Sony studios breach from 2014.
|
|
Lucrative Business: Hacking the Stock Market
|
A 28 year old hacker from Ukraine pleaded guilty to a $30 mil. scheme involving hacking & stealing unreleased press releases, and using the obtained information to make illegal trades. Over 30 others were involved in the scheme and are now facing criminal charges.
|
|
Is Mobile Security on Your Radar?
|
As the entire world moves towards mobile and the Internet of Things (IoT) surges the enterprise, mobile application security has become crucial for businesses of all sizes across the industry. After all, these devices are the gateway not just to our personal lives, but to our corporate brand integrity as well; and compromised security could spell a major disaster.
|
Interesting Reading From Around the Web
|
LinkedIn Resets Passwords As 117M Logins For Sale On Dark Web
|
LinkedIn has confirmed a significant breach from 2012 was worse than first thought, with the number of leaked usernames and passwords rising from 6.5 million to a purported 117 million.
|
|
Carding Sites Turn to the ‘Dark Cloud’
|
Crooks who peddle stolen credit cards on the Internet face a constant challenge: Keeping their shops online and reachable in the face of meddling from law enforcement officials, security firms, researchers and vigilantes. In this post, we’ll examine a large collection of hacked computers around the world that currently serves as a criminal cloud hosting environment for a variety of cybercrime operations, from sending spam to hosting malicious software and stolen credit card shops.
|
|
FDIC, Wendy's Delay Breach Notifications
|
Recent disclosures by the FDIC and Wendy’s following breach incidents underscore the protracted nature of detection and post-breach notifications. States in the U.S. and the European Union hope to shorten that timeline.
|
|
Upcomming Events
Enfuse 2016
Las Vegas, NV, May 24-26
More information
AlienSpy RAT Webinar w/ Cyphort
Online, May 25
2 PM EST/11 AM PST
More information
Net Diligence Cyber Forum
Philadelphia, PA, June 7-8
More information
ICT 2016
Bratislava, SK, June 7-8
More information
Featured Articles
Hackers Snatching Executive Emails, Costing Companies Billions
It goes like this. It’s a regular Tuesday. Things are humming along just fine. Someone you know from your HR department sends an email asking you to look over an attached spreadsheet. Or your supervisor emails you to review an attached Microsoft Word document. Nothing raises a red flag. So, you do as instructed. But the emails are fakes. The attachments and hyperlinks just opened up your system to fraud.
Expert Panel: The Top Considerations for Comparing Data Classification Tools
Data classification tools play an important role in enterprise data protection, tagging sensitive data in various formats to enable protective policies to be applied to different data types. As such, it's important that enterprises evaluate data classification options carefully and identify the best classification tools for their specific data protection needs.
|